Counter-intelligence - Counterintelligence Missions - Counterintelligence Force Protection Source Operations

Counterintelligence Force Protection Source Operations

Attacks against military, diplomatic and related facilities are a very real threat, as demonstrated by the 1983 attacks against French and US peacekeepers in Beirut, the 1996 attack on the Khobar Towers in Saudi Arabia, 1998 attacks on Colombian bases and on US embassies (and local buildings) in Kenya and Tanzania the 2000 attack on the USS Cole, and many others. The US military force protection measures are the set of actions taken against military personnel and family members, resources, facilities and critical information, and most countries have a similar doctrine for protecting those facilities and conserving the potential of the forces. Force protection is defined to be a defense against deliberate attack, not accidents or natural disasters.

Counterintelligence Force Protection Source Operations (CFSO) are human source operations, normally clandestine in nature, conducted abroad that are intended to fill the existing gap in national level coverage, as well as satisfying the combatant commander’s intelligence requirements. Military police and other patrols that mingle with local people may indeed be valuable HUMINT sources for counterintelligence awareness, but are not themselves likely to be CFSOs. Gleghorn distinguishes between the protection of national intelligence services, and the intelligence needed to provide combatant commands with the information they need for force protection. There are other HUMINT sources, such as military reconnaissance patrols that avoid mixing with foreign personnel, that indeed may provide HUMINT, but not HUMINT especially relevant to counterintelligence. Active countermeasures, whether for force protection, protection of intelligence services, or protection of national security interests, are apt to involve HUMINT disciplines, for the purpose of detecting FIS agents, involving screening and debriefing of non-tasked human sources, also called casual or incidental sources. such as:

  1. walk-ins and write-ins (individuals who volunteer information)
  2. unwitting sources (any individual providing useful information to counterintelligence, who in the process of divulging such information may not know they are aiding an investigation)
  3. defectors and enemy prisoners of war (EPW)
  4. refugee populations and expatriates
  5. interviewees (individuals contacted in the course of an investigation)
  6. official liaison sources.

"Physical security is important, but it does not override the role of force protection intelligence...Although all intelligence disciplines can be used to gather force protection intelligence, HUMINT collected by intelligence and CI agencies plays a key role in providing indications and warning of terrorist and other force protection threats.

Force protection, for forces deployed in host countries, occupation duty, and even at home, may not be supported sufficiently by a national-level counterterrorism organization alone. In a country, colocating FPCI personnel, of all services, with military assistance and advisory units, allows agents to build relationships with host nation law enforcement and intelligence agencies, get to know the local environments, and improve their language skills. FPCI needs a legal domestic capability to deal with domestic terrorism threats.

As an example of terrorist planning cycles, the Khobar Towers attack shows the need for long-term FPCI. "The Hizballah operatives believed to have conducted this attack began intelligence collection and planning activities in 1993. They recognized American military personnel were billeted at Khobar Towers in the fall of 1994, and began surveillance of the facility, and continued to plan, in June 1995. In March 1996, Saudi Arabian border guards arrested a Hizballah member attempting plastic explosive into the country, leading to the arrest of two more Hizballah members. Hizballah leaders recruited replacements for those arrested, and continued planning for the attack."

Read more about this topic:  Counter-intelligence, Counterintelligence Missions

Famous quotes containing the words force, protection, source and/or operations:

    The event combined with
    Beams leading up to it for the look of force adapted to the wiser
    Usages of age, but it’s both there
    And not there, like washing or sawdust in the sunlight,
    At the back of the mind, where we live now.
    John Ashbery (b. 1927)

    The protection of a ten-year-old girl from her father’s advances is a necessary condition of social order, but the protection of the father from temptation is a necessary condition of his continued social adjustment. The protections that are built up in the child against desire for the parent become the essential counterpart to the attitudes in the parent that protect the child.
    Margaret Mead (1901–1978)

    The ungentlemanly expressions and gasconading conduct of yours relative to me yesterday was in true character of yourself and unmask you to the world and plainly show that they were ebullitions of a base mind ... and flow from a source devoid of every refined sentiment or delicate sensations.
    Andrew Jackson (1767–1845)

    You can’t have operations without screams. Pain and the knife—they’re inseparable.
    —Jean Scott Rogers. Robert Day. Mr. Blount (Frank Pettingell)